skills/openclaw/skills/senior-qa/Gen Agent Trust Hub

senior-qa

Pass

Audited by Gen Agent Trust Hub on Feb 13, 2026

Risk Level: LOW
Full Analysis

================================================================================

✅ VERDICT: SAFE

This skill is deemed safe. No malicious patterns such as prompt injection, data exfiltration, obfuscation, privilege escalation, or persistence mechanisms were detected. The skill's functionality is transparent, benign, and aligns with its stated purpose of assisting with QA and test automation.

Total Findings: 0

================================================================================

Detailed Breakdown:

1. Prompt Injection: No patterns indicative of prompt injection (e.g., 'IMPORTANT: Ignore', role-play injection, system prompt extraction) were found in any of the skill's files, including SKILL.md and README.md.

2. Data Exfiltration: None of the Python scripts (coverage_analyzer.py, e2e_test_scaffolder.py, test_suite_generator.py) or documentation files contain code or instructions that attempt to read sensitive files (e.g., ~/.aws/credentials, ~/.ssh/id_rsa) or send data to external, non-whitelisted domains. References to process.env.STRIPE_KEY, process.env.TEST_EMAIL, etc., are illustrative examples for user configuration within their own projects and do not pose an exfiltration risk from the skill itself.

3. Obfuscation: No obfuscation techniques (Base64 encoding, zero-width characters, homoglyphs, URL/hex/HTML encoding) were found in any of the skill's files.

4. Unverifiable Dependencies: The skill's documentation (README.md, SKILL.md, references/*.md) mentions or implies the use of standard development tools and libraries such as npm, npx playwright, jest, codecov-action@v4, and faker-js/faker. While these involve downloading external resources, they are from trusted sources (npm registry, Playwright official, GitHub Actions, faker-js) and are standard for a development/QA workflow. These are not considered malicious or high-risk unverifiable dependencies.

5. Privilege Escalation: No commands or instructions were found that attempt to acquire elevated privileges (e.g., sudo, chmod 777, service installation) beyond what is necessary for a typical development environment.

6. Persistence Mechanisms: No attempts to establish persistence (e.g., modifying .bashrc, creating cron jobs, altering SSH authorized_keys) were found.

7. Metadata Poisoning: The _meta.json file and other metadata fields (skill name, description) were analyzed and found to contain no malicious instructions or hidden content.

8. Indirect Prompt Injection: The skill primarily generates code and analyzes reports. While any skill processing external user-provided content could theoretically be susceptible to indirect prompt injection, this skill's direct functionality does not involve processing arbitrary external text in a way that would lead to such a vulnerability. The risk is informational and inherent to the broader AI agent ecosystem, not specific to this skill's implementation.

9. Time-Delayed / Conditional Attacks: No conditional logic or time-based triggers for malicious behavior were identified in any of the scripts or documentation.

Conclusion: The 'Senior QA Testing Engineer Skill' is well-structured, transparent, and performs its intended functions safely. The Python scripts are local tools that operate on the user's codebase, and the instructions guide the user through standard, benign development practices.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 13, 2026, 09:44 AM